Weitere Kapitel dieses Buchs durch Wischen aufrufen
Encapsulation of information using mathematical barrier for forbidding malicious access is a traditional approach from past to modern era of information technology. Recent advancement in security field is not restricted to the traditional symmetric and asymmetric cryptography; rather, immense security algorithms were proposed in the recent past, from which biometric-based security, steganography, visual cryptography, etc. gained prominent focus within research communities. In this paper, we have proposed a robust cryptographic scheme to original message. First, each message byte, the ASCII characters ranging from Space (ASCII-32) to Tilde (ASCII-126), is represented as object using flat texture in a binary image which is decorated as n by n geometrical-shaped object in images of size N × N. Create a chaotic arrangement pattern by using the prime number encrypted by Advanced Encryption Standard (AES). The sub-images are shuffled and united as rows and columns to form a host covert or cipher image which looks like a grid-structured image where each sub-grid represents the coded information. The performance of the proposed method has been analyzed with empirical examples.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
H. Freeman, Computer processing of line drawing images, ACM Computer Surveys 6 (1974) 57–59.
S. Islam, M. R. Modi, P. Gupta, Edge-based image steganography, EURASIP Journal on Information Security, (2014) 2014, 8.
Yicong Zhou, Weijia Cao, C.L. Philip Chen, “Image encryption using binary bitplane”, Signal Processing, Vol. 100, pp. 197–207, Jul. 2014.
Chin-Chen Chang, Tai-Xing Yu, “Cryptanalysis of an encryption scheme for binary images”, Pattern Recognition Letters, Vol. 23, no. 14, pp. 1847–1852, Dec. 2002.
Yong-Ying Wang, Yu-Rong Wang, Yong Wang, Hui-Juan Li, Wen-Jia Sun, “Optical image encryption based on binary Fourier transform computer-generated hologram and pixel scrambling technology”, Optics and Lasers in Engineering, Vol. 45, no. 7, pp. 761–765, Jul. 2007.
KuangTsan Lin, “Digital information encrypted in an image using binary encoding”, Optics Communications, Vol. 281, no. 13, pp. 3447–3453. Jul. 2008.
Chengqing Li, Kwok-Tung Lo, “Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks”, Signal Processing, Vol. 91, no. 4, pp. 949–954, Apr. 2011.
Huijuan Yang and Alex C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving” IEEE Transactions on Multimedia Vol. 9, no. 3, pp. 475–486, Apr. 2007.
Chung-ChuanWange, Ya-Fen Changd, Chin-Chen Changc, Jinn-Ke Jana, Chia-Chen Linb, “A high capacity data hiding scheme for binary images based on block patterns”, Journal of Systems and Software, Vol. 93, pp. 152–162, Jul. 2014.
Ki-Hyun Jung, Kee-Young Yoo, “Data hiding method in binary images based on block masking for key authentication”, Information Sciences, Vol. 277, pp. 188–196, Sep. 2014.
NIST “Advanced Encryption Standard (AES)”, Federal Information Processing Standards Publication 197. 2001.
- Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard
Ram Chandra Barik
Sitanshu Sekhar Sahu
- Springer Singapore
Neuer Inhalt/© ITandMEDIA